Skip to content

Instantly share code, notes, and snippets.

@awcator
awcator / BouncyCastleCertificateGenerator.java
Created May 8, 2023 04:24 — forked from vivekkr12/BouncyCastleCertificateGenerator.java
Generate root X509Certificate, Sign a Certificate from the root certificate by generating a CSR (Certificate Signing Request) and save the certificates to a keystore using BouncyCastle 1.5x
import org.bouncycastle.asn1.ASN1Encodable;
import org.bouncycastle.asn1.DERSequence;
import org.bouncycastle.asn1.x500.X500Name;
import org.bouncycastle.asn1.x509.BasicConstraints;
import org.bouncycastle.asn1.x509.Extension;
import org.bouncycastle.asn1.x509.GeneralName;
import org.bouncycastle.asn1.x509.KeyUsage;
import org.bouncycastle.cert.X509CertificateHolder;
import org.bouncycastle.cert.X509v3CertificateBuilder;
import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter;
@awcator
awcator / gist:c0e5f0c224d8fae85aa0e43280576482
Created March 25, 2023 09:11
Mega Bypass traffic using SockPorxy
ssh -i ~/.ssh/path/to/key -D 8080 -L localhost:8081:mega.nz:443 ubuntu@yourHost
#Now you can hit mega.nz from localhost:8081 as http_prxy
#or you can use socks5 proxy on port 8080 to hit mega
apk d original.apk
apk b /path/to/extracteAPK_contents -o mod.apk
keytool -genkey -keystore awcator1.keystore -validity 10000 -alias awcator1 -keyalg rsa
jarsigner -keystore awcator1.keystore -verbose mod.apk awcator1
@awcator
awcator / My_BYPASS
Last active May 16, 2022 15:26
Greasemonkey module to disable tabswtich detection
// ==UserScript==
// @name Match Every Site
// @namespace https://targetwebsite.com/
// @version 1.1
// @description Bypass fullscreen/tabswtich/invisbility screen
// @author Dev
// @match *://*/*
// @grant unsafeWindow
// ==/UserScript==
@awcator
awcator / setUpVNC_CHROME.sh
Created February 26, 2021 14:11
Simple VNC setup on GSHELL
sudo apt update
sudo apt upgrade
#sudo apt install -y xfce4 xfce4-goodies vnc4server novnc websockify python-numpy chromium
sudo DEBIAN_FRONTEND=noninteractive apt-get -yq install xfce4 xfce4-goodies vnc4server novnc websockify python-numpy chromium
vncserver
vncserver -kill :1
echo "#!/bin/bash" > ~/.vnc/xstartup
echo 'xrdb $HOME/.Xresources' >> ~/.vnc/xstartup
@awcator
awcator / dropper.c
Last active May 16, 2022 15:32
MITM packet dropper
/**
* Author: Awcator
* Tool to guess the TCP sequence number and breaks that particular tcp connnection. There by providing a good defence for DDOS attacks.
*
* How?:
* Captures ack_seq,seq during 2nd stage of 3 way hand shake and performs attack for 4th hand shake
* suppose: 2nd Hand Shake: from port 4444 to port 469996 with SQN,ACK seq=781,ack_seq=694
* then, craft a packet at 4th transaction as, port from 469996 to 4444 with seq as 694 and ack_seq as 781 with flags, Finish,Ack.
* Recomute Checksum and send packet
* Works on lo, need to create ethernet packets to send over network hardware.